Detection of suspicious behavior from a sparse set of multiagent interactions
暂无分享,去创建一个
[1] Rama Chellappa,et al. "Shape Activity": a continuous-state HMM for moving/deforming shapes with application to abnormal activity detection , 2005, IEEE Transactions on Image Processing.
[2] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[3] Robert P. Goldman,et al. A probabilistic plan recognition algorithm based on plan tree grammars , 2009, Artif. Intell..
[4] Milind Tambe,et al. ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison , 2011, AAMAS.
[5] Gal A. Kaminka,et al. Incorporating Observer Biases in Keyhole Plan Recognition (Efficiently!) , 2007, AAAI.
[6] Alex Pentland,et al. Coupled hidden Markov models for complex action recognition , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[7] Lisa M. Brown,et al. Case Study: IBM Smart Surveillance System , 2009 .
[8] Ramakant Nevatia,et al. Large-scale event detection using semi-hidden Markov models , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[9] Nir Friedman,et al. Probabilistic Graphical Models - Principles and Techniques , 2009 .
[10] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[11] Björn W. Schuller,et al. Suspicious Behavior Detection in Public Transport by Fusion of Low-Level Video Descriptors , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[12] Svetha Venkatesh,et al. Activity recognition and abnormality detection with the switching hidden semi-Markov model , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[13] Gita Reese Sukthankar,et al. Hypothesis Pruning and Ranking for Large Plan Recognition Problems , 2008, AAAI.
[14] Paul Helman,et al. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..